BugId OOBW[4n]-4n~4n ed2.531 @ tests_x86.exe!wmain summary

BugId: OOBW[4n]-4n~4n ed2.531
Location: tests_x86.exe!wmain
Source: p:\dev\cbugid\tests\src\_tmain.cpp @ 484
Description: Heap corruption detected at 0xBD80FFC; 4 bytes before a 8388608/0x800000 bytes heap block at 0xBD81000.
Version: Tests_x86.exe: Wed May 10 23:52:12 2017 (59138B8C) (x86)
Security impact: Potentially exploitable security issue, if the corruption is attacker controlled.
Integrity level: 0x2000 (Medium Integrity; this process appears to not be sandboxed!)
Arguments: ['OutOfBounds', 'Heap', 'Write', '0x800000', '-4', '4']

BugId version 2017-11-14 10:21. You may not use this version of BugId for commercial purposes. Please contact the author if you wish to use BugId commercially. Contact and licensing information can be found at the bottom of this report.

Stack

  1. verifier.dll!VerifierBreakin + 0x42 (this frame is irrelevant to this bug)
  2. verifier.dll!VerifierCaptureContextAndReportStop + 0xFA (this frame is irrelevant to this bug)
  3. verifier.dll!VerifierStopMessage + 0x2C7 (this frame is irrelevant to this bug)
  4. verifier.dll!AVrfpDphReportCorruptedBlock + 0x2E5 (this frame is irrelevant to this bug)
  5. verifier.dll!AVrfpDphCheckNormalHeapBlock + 0x11A (this frame is irrelevant to this bug)
  6. verifier.dll!AVrfpDphNormalHeapFree + 0x22 (this frame is irrelevant to this bug)
  7. verifier.dll!AVrfDebugPageHeapFree + 0xE3 (this frame is irrelevant to this bug)
  8. ntdll.dll!RtlDebugFreeHeap + 0x3C (this frame is irrelevant to this bug)
  9. ntdll.dll!RtlpFreeHeap + 0x5616D (this frame is irrelevant to this bug)
  10. ntdll.dll!RtlFreeHeap + 0x7CD (this frame is irrelevant to this bug)
  11. Tests_x86.exe!wmain + 0x1726 (id: ed2) [[p:\dev\cbugid\tests\src\_tmain.cpp @ 484]]
  12. Tests_x86.exe!invoke_main + 0x1D (inlined function, id: 531)
  13. Tests_x86.exe!__scrt_common_main_seh + 0xF9 [[f:\dd\vctools\crt\vcstartup\src\startup\exe_common.inl @ 253]]
  14. KERNEL32.DLL!BaseThreadInitThunk + 0x24
  15. ntdll.dll!__RtlUserThreadStart + 0x2F
  16. ntdll.dll!_RtlUserThreadStart + 0x1B
⇓ click on the title of a section to open or close it.